Wednesday, May 29, 2013

Hackers exploit Ruby on Rails vulnerability

Computerworld Security: May 29, 2013
===============================================================

Hackers exploit Ruby on Rails vulnerability

Hackers are actively exploiting a critical vulnerability in the Ruby on Rails
Web application development framework in order to compromise Web servers and
create a botnet.
http://cwonline.computerworld.com/t/8598064/823929835/613754/0/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Prolexic Technologies~~~~~~~~~~~~~~~~~~~~~

Prolexic White Paper: DDoS DNS Reflection Attacks

Domain name system (DNS) servers can be harnessed for cyber attacks. This white
paper explains what IT groups and ISPs can do to protect their servers and
networks from this increasingly popular distributed reflection and amplification
(DrDoS) attack.

http://cwonline.computerworld.com/t/8598064/823929835/613755/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Richi Jennings: BUSTED: Feds seize Liberty Reserve domains (then they came for Bitcoin?)
http://cwonline.computerworld.com/t/8598064/823929835/613756/0/

2. Anonymous member pleads guilty to Stratfor hack
http://cwonline.computerworld.com/t/8598064/823929835/613757/0/

3. Darlene Storm: Protect American IP by deploying malware to lock hackers, pirates out of PCs?
http://cwonline.computerworld.com/t/8598064/823929835/613758/0/

4. Harvard dean who okayed secret faculty email search steps down
http://cwonline.computerworld.com/t/8598064/823929835/613759/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: serVelocity~~~~~~~~~~~~~~~~~~~~~

Priorities for Reversing Services Decay

The state of the high tech services industry is in flux as never before. With
changing patterns of software/solution consumption and pressure on traditional
service delivery models increasing, many leaders "get it" and want to move
services forward. But we are often reactive given the reality of the world we
live in.

http://cwonline.computerworld.com/t/8598064/823929835/613760/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=c3637b9f

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Richi Jennings: BUSTED: Feds seize Liberty Reserve domains (then they came for Bitcoin?)


...and I didn't speak out, because I didn't use Liberty Reserve. The U.S.
seizes libertyreserve.com and other domains used by the online payment
processor. The DoJ alleges that digital currency service was a huge haven for
illegal activity. But legitimate users cry collateral damage. In IT Blogwatch,
bloggers ponder double-standards and fear for future fracas.
http://cwonline.computerworld.com/t/8598064/823929835/613756/0/

Anonymous member pleads guilty to Stratfor hack

A former member of a band of hackers faces up to 10 years in prison after
pleading guilty Tuesday to a single computer hacking charge.
http://cwonline.computerworld.com/t/8598064/823929835/613757/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Perforce Software~~~~~~~~~~~~~~~~~~~~~

Solving the Five Pain Points of Agile Development

Research shows that developers are struggling in five key areas. Access the
latest Agile SCM research, videos, and success stories to learn how to overcome
the latest roadblocks to developer productivity and performance in the
enterprise.

http://cwonline.computerworld.com/t/8598064/823929835/613761/0/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=38d0f8df

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Darlene Storm: Protect American IP by deploying malware to lock hackers, pirates out of PCs?


Chinese government hackers infiltrated defense contractors working on critical
weapon systems, but were also accused of 50 – 80% of intellectual property
theft. Although stopping other countries from stealing American trade secrets
sounds like a good idea, suggestions by the "Commission on the Theft of
American Intellectual Property" could also go after file-sharers with
pirated content. The commission recommended "not yet legal" actions
such as deploying malware on the offender's computer, locking down or
destroying computers with illegal copies, and even "photographing the
hacker using his own system's camera."
http://cwonline.computerworld.com/t/8598064/823929835/613758/0/

Harvard dean who okayed secret faculty email search steps down

Harvard College Dean Evelynn Hammonds, who last month acknowledged authorizing a
secret search of email belonging to several residential deans at the school,
will step down from her position July 1.
http://cwonline.computerworld.com/t/8598064/823929835/613759/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8598064/823929835/604375/0/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8598064/823929835/598565/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

One of the first Google Glass apps, Winky, lets Glass users take pictures with
the blink of an eye, leading some to start talking about a potential privacy
issues and social etiquette. Would you buy a pair of Google Glass when it
becomes available?

http://cwonline.computerworld.com/t/8598064/823929835/611670/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8598064/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8598064/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/8598064/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/8598064/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8598064/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NTk4MDY0&x=0eebe156

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8598064/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8598064/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8598064/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:43 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive